Baseline Information Services Free IT Assessment - Call 720.985.9911

Baseline Information Services recommends high-quality solutions built with leading technologies that are designed to meet the needs of your growing business.

We can help solve your strategic and tactical IT decisions and partner with you to discern which solutions bring real value to your organization.

5 Frequently Asked Questions About Malware

December 8th, 2017

One of the biggest topics in business and IT today is cybersecurity. Making sure your network is safeguarded against hacks and viruses is of utmost importance when it comes to protecting your interests and maintaining the security of your customers' important data. Malware is one of the most prominent concerns when it comes to network security. A catch-all term for any unauthorized software that can be detrimental to the computer network and all of the information within it. Here are some of the most frequently-asked questions about malware to help you ramp up your security and protect your business against a would-be cyberattack.

Malware FAQ's

  1. Is All Adware Malware? In a word, no. While some malware certainly takes the guise of adware, such as pop-up ads on websites or in-program ads that install unnecessary toolbars when you are downloading other applications, not all adware is harmful or detrimental to your computer in terms of security. However, adware is still a distraction and a nuisance that slows down your important programs and should be dealt with as soon as possible.
  2. What are the Implications of Spyware Being Detected on my Network? If a recent virus or malware scan indicate the presence of spyware, swift measures should be taken to remove it from your hard drive at once. Spyware can range from relatively harmless (for example, it can track your browsing history for marketing data collection) to downright destructive (for instance, a spyware program that infiltrates your client database can cause a data security breach and open customers up to potential identity theft). It is best practice to deal with all spyware as though it is the most detrimental kind, and have all traces of it wiped from your network using a good anti-malware program.
  3. Worms, Viruses...Is There a Difference? While computer viruses are able to infect multiple files and spread to other machines both off and on the network through emails or on infected files on USB drives, worms can actually spread to other computers on their own, without help from users. Worms can copy themselves thousands of times over and send themselves to other networks by finding vulnerabilities in firewalls or email security. Worms generally destroy system files by "eating" them, causing productivity delays. However, these days, a number of worms also contain "payloads", which are malicious programs written to delete key files.
  4. I've Heard a Lot About Ransomware- Should I be Concerned? Ransomware has become a hot topic as of late, with several major stories in the news about major ransomware threats. Ransomware works as a virus, infecting a computer's files. However, rather than corrupting the files, it instead encrypts them, then demands a ransom from the user for the files to be unlocked. If the user doesn’t pay up, the files remain encrypted, rendering the computer virtually useless, or are deleted completely. Business owners of all sizes should be concerned about ransomware, as it can be extremely costly and seriously affect the productivity and operation of your company for as long as it takes to unlock the files.
  5. Are Rootkits a Good Thing or a Bad Thing? Like many IT-related things, that all depends on whose hands a rootkit has fallen into. Rootkits can be extremely useful for IT professionals to remotely access a computer terminal or network and troubleshoot an issue. However, a rootkit can be used for more sinister purposes, as it can allow hackers easy access to take control of your computer for the purpose of installing malware or deleting data. Since rootkits are designed to remain hidden and undetected, it's best to constantly monitor your network manually for unusual behavior or activity, as well as installing frequent OS updates and patches and keeping all your software updated with the latest version.

Contact Baseline IS Today

With the help from Baseline IS, a solid malware monitoring program installed on your network, as well as reliable IT support in your corner, you should be able to protect your business against malware. By actively preventing malware attacks before they happen, you can save yourself, your customers and your company a world of trouble, which will serve you well as you continue to grow your client base.

< Back…

Baseline IS | 26005 Wilkerson Road, Conifer, CO 80433 | 720.985.9911


Website Design by my1pagewebsite.com. Copyright © 2013 Streamlined Web Design, LLC. All Rights Reserved.